54.76.195.222

Regular View Raw Data
Last Seen: 2024-04-09
Tags:
cloud

GeneralInformation

Hostnames ec2-54-76-195-222.eu-west-1.compute.amazonaws.com
sandbox.hangers.io
Domains amazonaws.com hangers.io 
Cloud Provider Amazon
Cloud Region eu-west-1
Cloud Service EC2
Country Ireland
City Dublin
Organization Amazon Technologies Inc.
ISP Amazon.com, Inc.
ASN AS16509
Operating System Windows

WebTechnologies

Cookie compliance
Documentation
Issue trackers
JavaScript libraries
Live chat
UI frameworks
Web frameworks

Vulnerabilities

Note: the device may not be impacted by all of these issues. The vulnerabilities are implied based on the software and version.

CVE-2020-23064 6.1Cross Site Scripting vulnerability in jQuery 2.2.0 through 3.x before 3.5.0 allows a remote attacker to execute arbitrary code via the <options> element.
CVE-2020-11023 6.1In jQuery versions greater than or equal to 1.0.3 and before 3.5.0, passing HTML containing <option> elements from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.
CVE-2020-11022 6.1In jQuery versions greater than or equal to 1.2 and before 3.5.0, passing HTML from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.
CVE-2019-11358 6.1jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishandles jQuery.extend(true, {}, ...) because of Object.prototype pollution. If an unsanitized source object contained an enumerable __proto__ property, it could extend the native Object.prototype.

OpenPorts

-1754810510 | 2024-04-09T15:40:46.516607
  
80 / tcp
718221214 | 2024-04-09T18:34:21.325835
  
443 / tcp



Contact Us

Shodan ® - All rights reserved